Claim Missing Document
Check
Articles

Found 3 Documents
Search

PERENCANAAN AUDIT TATA KELOLA TEKNOLOGI INFORMASI MENGGUNAKAN FRAMEWORK COBIT 2019 (STUDI KASUS: PT. LAZ COAL MANDIRI) Muh Wal Ikram; Winarno, Wing Wahyu; Arief, Muhammad Rudyanto
TEKNIMEDIA: Teknologi Informasi dan Multimedia Vol. 4 No. 2 (2023): Desember 2023
Publisher : Badan Penelitian dan Pengabdian Masyarakat (BP2M) STMIK Syaikh Zainuddin NW Anjani

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.46764/teknimedia.v4i2.109

Abstract

This study aims to identify and plan IT governance audits to support the business processes of PT. Laz Coal Mandiri. In achieving its goals, the company must synchronize the application of IT with the company's focus so that an information technology governance audit plan is needed at PT. Laz Coal Mandiri is aligned with the use of IT in companies. The purpose of an IT governance audit is to find out management discrepancies, optimize performance and to achieve the company's vision and mission. This research is supported by the absence of an assessment of the design of IT governance at the company. COBIT 2019 as the latest edition framework from ISACA makes improvements using design factors. The research method used is descriptive qualitative by conducting interviews with stakeholders. Obtained research results based on objective measurements of APO12 have a level of ability at level 2 while APO13 has a level of ability at level 1.
Data Ranking Optimization: Hybrid Fuzzy AHP-VIKOR with Information Gain Ratio Attribute Reduction Muzakir, Muhammad; Kusrini, Kusrini; Arief, Muhammad Rudyanto
KLIK- KUMPULAN JURNAL ILMU KOMPUTER Vol 11, No 2 (2024)
Publisher : Lambung Mangkurat University

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.20527/klik.v11i2.689

Abstract

Poverty in Indonesia, including in Banjarmasin City, South Kalimantan Province, remains a significant issue despite the government's implementation of various mitigation programs. One of the primary challenges is the distribution of social assistance, which often fails to reach the intended beneficiaries. To address this problem, this study aims to apply the Hybrid Fuzzy Analytic Hierarchy Process (AHP) - Technique for Order Preference by Similarity to Ideal Solution (VIKOR) algorithm to the integrated social welfare data (DTKS) in Banjarmasin City. The hybrid Fuzzy AHP - VIKOR approach is employed in this study to rank social assistance recipients based on the available dataset, which consists of 2,879 records. Fuzzy AHP is utilized for the weighting and classification process, while VIKOR is applied to rank the alternatives. The combination of these two methods is expected to yield a more accurate ranking that aligns with the actual needs identified in the DTKS data for Banjarmasin City. The findings of this study demonstrate that the application of AHP and VIKOR methods produces more accurate rankings in accordance with the real data. These results have significant implications for enhancing the effectiveness of poverty alleviation programs and aiding the Banjarmasin City government in prioritizing the distribution of social assistance. By integrating the Fuzzy AHP and VIKOR methods, this study provides a deeper understanding of the more targeted distribution of social assistance, which is anticipated to improve the effectiveness of poverty alleviation programs in Banjarmasin City and beyond.
EVALUASI DASAR PENETRATION TESTING MENGGUNAKAN FRAMEWORK MITRE ATT&CK Wahyudi, Vivin; Arief, Muhammad Rudyanto; Santoso, Banu; Nugroho, Rangga Wahyu
E-Link: Jurnal Teknik Elektro dan Informatika Vol. 20 No. 1: Mei 2025
Publisher : Universitas Muhammadiyah Gresik

Show Abstract | Download Original | Original Source | Check in Google Scholar | DOI: 10.30587/e-link.v20i1.9399

Abstract

Penetration testing is a method used to identify security vulnerabilities in networks or computer systems. In this process, pentesters attempt to exploit security gaps by simulating potential attacks that could be carried out by an actual attacker. The goal of penetration testing is to evaluate the security of computer systems or networks. This multi-stage approach, which includes information gathering, exploitation, and post-exploitation, utilizes the MITRE ATT&CK framework. Tools are used to help identify and exploit security weaknesses, such as nmap, netdiscover, metasploit, SSH, and MySQL. This research can reduce the risk of data loss and operational disruptions, enhance pentesters' skills and awareness, and strengthen the security of computer systems and networks.